User input passed through the "asc" or "desc" GET parameters is not properly sanitized before being used in a call to the "eval()" function at line 195. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires an account with the "AT_PRIV_GRADEBOOK" privilege.